Quote Originally Posted by Traajel View Post
Apologies if this has already been said - I had a quick scan through the replies and couldn't see it standing out, but I think it needs to be mentioned...

MAC filtering is incredibly easy for an intruder to get around. The attacker only needs to intercept packets between an allowed client machine and the access point, and can then read the MAC address of the client machine and spoof their own MAC address to be the same. It is not advisable to use this as a security method (or at very least not the main security method)
Very true! However the Drayteks allow you to apply encryption to protect the link and then use Mac filtering to prevent access to the network, while allowing access to the gateway.

Welcome to Hexus btw!